From: | Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us> |
---|---|
To: | Stephen Frost <sfrost(at)snowman(dot)net> |
Cc: | Bruno Wolff III <bruno(at)wolff(dot)to>, pgsql-hackers(at)postgresql(dot)org |
Subject: | Re: [PATCHES] Users/Groups -> Roles |
Date: | 2005-06-28 22:25:59 |
Message-ID: | 2488.1119997559@sss.pgh.pa.us |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers pgsql-patches |
Stephen Frost <sfrost(at)snowman(dot)net> writes:
> * Bruno Wolff III (bruno(at)wolff(dot)to) wrote:
>> Creating objects in particular schemas or databases is not something that
>> all roles may be able to do.
> Yeah, I'm not entirely sure what I think about this issue.
We have a precedent, which is that RENAME checks for create rights.
If you want to lean on the argument that this is just a shortcut for
dropping the object and then recreating it somewhere else, then you
need (a) the right to drop the object --- which is inherent in being
the old owner, and (b) the right to create the new object, which means
that (b1) you can become the role you wish to have owning the object,
and (b2) *as that role* you would have the rights needed to create the
object.
Stephen's original analysis covers (a) and (b1) but not (b2). With (b2)
I'd agree that it's just a useful shortcut.
I don't see a need to treat SECURITY DEFINER functions as
superuser-only. We've had that facility since 7.3 or so and no one
has complained that it's too dangerous.
regards, tom lane
From | Date | Subject | |
---|---|---|---|
Next Message | Denis Lussier | 2005-06-28 22:29:49 | Re: Implementing SQL/PSM for PG 8.2 - debugger |
Previous Message | Jonah H. Harris | 2005-06-28 21:58:52 | Re: Implementing SQL/PSM for PG 8.2 - debugger |
From | Date | Subject | |
---|---|---|---|
Next Message | Bruce Momjian | 2005-06-28 23:14:41 | Re: COPY FROM performance improvements |
Previous Message | Marko Kreen | 2005-06-28 21:21:03 | Re: [PATCH] pgcrypto: pgp_encrypt (v2) |